Sciweavers

6434 search results - page 1040 / 1287
» Model Transformations with Reference Models
Sort
View
ITRUST
2005
Springer
15 years 9 months ago
Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences
Collaborative Filtering (CF), the prevalent recommendation approach, has been successfully used to identify users that can be characterized as “similar” according to their logg...
Manos Papagelis, Dimitris Plexousakis, Themistokli...
107
Voted
PROFES
2005
Springer
15 years 9 months ago
Framework for Integrating Usability Practices into the Software Process
Software development organizations wanting to introduce usability practices into their defined software process have to undertake laborious efforts for that purpose, since, for the...
Xavier Ferré, Natalia Juristo Juzgado, Ana ...
128
Voted
FASE
2004
Springer
15 years 9 months ago
Systematic Testing of Software Architectures in the C2 Style
The topic of software architecture (SA) based testing has recently raised some interest. Recent work on the topic has used the SA as a reference model for code conformance testing,...
Henry Muccini, Marcio S. Dias, Debra J. Richardson
137
Voted
LATIN
2004
Springer
15 years 9 months ago
Pure Future Local Temporal Logics Are Expressively Complete for Mazurkiewicz Traces
The paper settles a long standing problem for Mazurkiewicz traces: the pure future local temporal logic defined with the basic modalities exists-next and until is expressively com...
Volker Diekert, Paul Gastin
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
15 years 9 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
« Prev « First page 1040 / 1287 Last » Next »